3.0 Security Architecture

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/51

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

52 Terms

1
New cards

Data Sovereignty

refers to data being subject to the laws and regulations of the country where it is physically located or stored

crucial for multinational corporations to ensure compliance with varying legal frameworks

2
New cards

VPN

creates secure, encrypted tunnel over the internet

ideal for a security consultant who needs access to a clients environment remotely and securely

3
New cards

IaC (infrastructure as code)

Enables DevOps teams to automate the setup and scaling of their cloud infrastructure making deployment of resources more efficient and less prone to human error

allows organizations to streamline infrastructure changes so that they occur more easily, rapidly, securely, safely, and reliably

foundational systems are set up and overseen using scripts and automated instruments instead of hands on methods

4
New cards

PaaS (Platform as a service)

provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure

5
New cards

Data classifications

first step in data protection

helps identify what needs safeguarding

6
New cards

Tabletop exercise

simulate cyber incidents in a controlled, discussion based format

evaluate the effectiveness of the organizations incident response plan

involves key personnel discussing their roles and responses to a hypothetical scenario

helps identify gaps and areas for improvement without the need for technical assessments or physical testing

7
New cards

Permission Restrictions

allow organizations to control access to specific data based on users roles and privileges

ensures only authorized individuals can access a private customer database

8
New cards

Passive device placement

monitors for data breaches by analyzing and logging traffic without interfering with network operations

IDS

9
New cards

Active device placement

actively modifies or influence the network traffic

can make real time decisions (blocking, redirecting, or modifying traffic)

IPS or Firewall

10
New cards

WAF (web application firewall)

designed to monitor, filter, and block harmful traffic and attacks towards web application (such as SQL and XSS)

operates at application layer

11
New cards

Intellectual Property

encompasses confidential information critical to a companies advantage

such as trade secrets or patents stored in a database

12
New cards

EAP (extensible Authentication Protocol)

provides a standard interface for integrating multiple authentication methods

can be used in various network access scenarios including wireless

provides flexible authentication without requiring changes to the underlying authentication mechanism 

13
New cards

LDAP (lightweight directory access protocol)

used to access directory systems over IP networks

used for directory querying and authentication

14
New cards

RADIUS (remote authentication dial in user service)

a protocol for carrying authentication, authorization, and configuration information between a network access server and a central server

can support EAP as one of its methods

15
New cards

NGFW (next generation firewalls)

goes beyond traditional firewalls by incorporating more advanced features like IPS, application awareness, and deep packet inspection

provides enhanced visibility and can detect advanced threats, making them suitable for contemporary security challenges 

16
New cards

Proxy firewalls

acts as intermediary for requests from users seeking resources from other servers

filters requests at the application layer

does not provide advanced threat detection capabilities

17
New cards

Stateful firewall 

keeps track of the state of active connections and decides on packet allowance based on the context of the traffic 

doesn’t offer deeper visibility and advanced features. 

18
New cards

Responsibility matrix

a document that defines the roles and responsibilities of different parties involved in a cloud service agreement (cloud service provider, the cloud customer, and the cloud user)

clarifies who is accountable for what aspects of security, compliance, and operations in a cloud environment

19
New cards

Continuous backups 

allows near instantaneous backup of changed data

ensures minimal loss during failures, especially crucial for high-volume transactions systems 

20
New cards

SDN (software defined networking)

manages network controls through software

separates the control plane from the data plane, allowing for more flexibility and automation in network management

does not focus on running multiple OSes on a single server

21
New cards

Replication

involves creating copies of data in real time or near real time to another location

ensures data availability even if one location fails and can also aid in load balancing

22
New cards

Differential backups

stores all changes made since last full backup

provides a medium between full and incremental backups but does not provide real time data duplication

23
New cards

Snapshots

captures the state of a system at a specific point in time

offers quick recovery options, they do not involve real time duplication of data

24
New cards

Infrastructure diversification

ensures that organizations are not overly reliant on a single data center, network, or platform

by distributing their assets and systems across multiple locations or platforms, they can significantly reduce the risk of total service disruption if on component fails

25
New cards

RTOS (real time operating system)

prioritizes performance, sometimes at the expense of security features like buffer overflow protections, potentially leaving the system susceptible to certain attacks due to factors like inadequate buffer overflow protections

26
New cards

Layer 4, transport layer

deals with protocols like TCP and UDP and is concerned with port numbers and connection oriented communication

network appliances operating at this layer filter and manage traffic based on source and destination IP addresses, as well as port numbers

27
New cards

Proxy server

sits between a client and destination server, forwarding requests and responses on behalf of the client 

can effectively mask the clients IP address, providing a level of privacy and anonymity 

is not for administrative access but rather to control and optimize internet usage

28
New cards

Jump server

facilitates administrative access to an environment

provides controlled means of access, reducing exposure of the underlying infrastructure

increases security by limiting the routes traffic can take into a system

isnt designed to forward and mask internet requests from clients to destination servers

29
New cards

Serverless architecture

abstracts the infrastructure layer, allowing developers to focus on writing code while the cloud provider manages everything else

allows devs to write and deploy code without concern for the underlying infrastructure because the cloud provider automatically manages the execution, scaling, and networking

30
New cards

SASE (secure access service edge)

combines WAN capabilities with cloud native security functions

does not serve to detect and alert about suspicious activities

31
New cards

Journaling

keeps track of all transactions and changes that occur within a system

this record allows for precise recovery to the moment before the disruption in the even of a crash or failure

32
New cards

SD-WAN (Software defined wide area network)

provides centralized network management, flexible routing, and traffic management capabilities

can be hosted on both on premise and in the cloud, giving it an edge for comprehensive WAN optimization

33
New cards

steganography

data that is embedded in a picture or some other source

34
New cards

Microservices

multiple small services communicating with each other

this inter-service communication can introduce complexities and potential vulnerabilities if not properly secured

typically decoupled from the physical hardware layer and focuses more on application logic

35
New cards

parallel processing 

allows different recovery strategies to be assessed at the same time, enabling faster and more comprehensive analysis of their effectiveness after a breach

can simultaneously asses multiple recovery strategies after a security breach

36
New cards

embedded systems

software is hardcoded into firmware

often lacks the flexibility for timely updates or patches, potentially leaving them vulnerable to undiscovered or unaddressed threats

37
New cards

snowflake systems

unique configurations that can cause drift in platform environments

can result in unpatched vulnerabilities and systems that dont behave as expected due to minor configuration variances

may lead to the need for manual configuration and patch installation

may create instability and lack of security

38
New cards

IPSec (internet protocol security)

a collection of standards that work on the tansport (layer 4) of the OSI model

used to ensure that the data is securely transmitted

commonly used in VPNs, provides authentication and integrity of data as it is transmitted

39
New cards

Data obfuscation 

alters data to make it unreadable but retains its format and structure

ensuring a team can carry out analytics without viewing the actual content 

40
New cards

hashing

transforms data into fixed size representation

a one way functions, not designed to be reversible

41
New cards

Tokenization

replaces sensitive data with non sensitive substitutes (tokens)

secure data but does not provide fixed size representation

42
New cards

in line device

actively evaluates network traffic as it passes through

allows it to reject or modify packets according to predefined security policies

ideal for actively enforcing security rules and blocking malicious traffic in real time

43
New cards

Clustering

involves combining a number of servers into one node

different servers can be assigned different tasks to provide greater fault tolerance

each server can handle one part of a complex website, if one server goes down, the task that the server performs may be unavailable but the rest of the website will still function

44
New cards

Network appliance sensor

passively monitors network traffic, looking for signs of malicious or anomalous activity

wont disrupt regular network operations as it operates in “listen-only” mode

45
New cards

GDPR

governs protection of sensitive personal data referring to specific categories of personal information that could harm an individual if made public

includes but not limited to, religious beliefs, political opinions, trade union membership, gender, sexual orientation, racial or ethnic origin, genetic data, and health information

46
New cards

ICS 

integral to manufacturing and industrial environments, overseeing and controlling processes for accuracy and safety

ensures precision and safety in operations

47
New cards

tap/monitor mode

refers to a device that copies network traffic for analysis without interrupting or altering the data flow

allows admins to monitor and capture traffic in real time for diagnostic or security purposes

48
New cards

resilience

refers to the ability of the system to quickly recover from failures and maintain operational performance

crucial for ensuring availability during adverse conditions

49
New cards

containerization

encapsulates an application with its environment guaranteeing uniform behavior across systems

bundles an application and its environment for consistent behavior across platforms

50
New cards

NDA

legally bind personnel to confidentiality and secure handling of proprietary data

prevents unauthorized dissemination or replication of this crucial information

51
New cards

Virtualization

allows creating multiple isolated environments on a single physical device

offers resource optimization, isolation, flexibility, and security

52
New cards

simulations

uses controlled environments to replicate security breaches, enabling IT professionals to practice responses.

Explore top flashcards

MGMT 445: Exam 2
Updated 896d ago
flashcards Flashcards (33)
Ap Euro Final
Updated 1030d ago
flashcards Flashcards (82)
Psych. Chapter 13
Updated 986d ago
flashcards Flashcards (38)
2 - EasyGerman
Updated 50d ago
flashcards Flashcards (35)
CHAPTER 6 SKIN
Updated 365d ago
flashcards Flashcards (57)
CSCI 50.01 LT#3
Updated 318d ago
flashcards Flashcards (250)
Times tables
Updated 733d ago
flashcards Flashcards (144)
MGMT 445: Exam 2
Updated 896d ago
flashcards Flashcards (33)
Ap Euro Final
Updated 1030d ago
flashcards Flashcards (82)
Psych. Chapter 13
Updated 986d ago
flashcards Flashcards (38)
2 - EasyGerman
Updated 50d ago
flashcards Flashcards (35)
CHAPTER 6 SKIN
Updated 365d ago
flashcards Flashcards (57)
CSCI 50.01 LT#3
Updated 318d ago
flashcards Flashcards (250)
Times tables
Updated 733d ago
flashcards Flashcards (144)